Pattern Based Data Security Algorithm
Keywords:
Encryption, Decryption, Plain Text, Cipher Text, Patterns, Binary Value, Decimal ValueAbstract
During the last decades, information security has become an area of concern. Encrypting and decrypting data has been widely developed because there is a demand for a highly secured data in today’s world. Encryption, is the process of changing intelligible data into unintelligible data which is unreadable by anyone except those possessing special knowledge (usually referred to as a "key") that allows them to change the information back to the original form. Encryption is important because it secures the data that you don't want anyone else to have access to. People try to protect their physical assets such as networked computers, databases, servers, etc. Encryption protects the data that lives on and between those devices. It is one of the most powerful way to keep your data safe, and while it isn’t impenetrable, it’s a major deterrent to hackers. Even if data does end up getting stolen, it will be unreadable and nearly useless if it’s encrypted. "Pattern Security" provides new encryption methodology without the use of key. The method follows the rules of pattern which is already designed by the organization. The pattern security provides three level database security. The ultimate goal of Pattern Security is Easy Encryption and Difficult Decryption.
References
- Swarnalata Bollavarapu and Ruchita Sharma – “Data Security using Compression and Cryptography Techniques”
- Sarita Kumari – “A research Paper on Cryptography Encryption and Compression Techniques”
- Nirmaljeet Kaur, Sukhman Sodhi – “Data Encryption Standard Algorithm (DES) for Secure Data Transmission”
- www.ijarcs.info/index.php/Ijarcs/article/download/1588/1576
- https://pdfs.semanticscholar.org/187d/26258dc57d794ce4badb094e64cf8d3f7d88.pdf
- www.ijsrp.org/research-paper-1301/ijsrp-p1315.pdf
- www.ijarcs.info/index.php/Ijarcs/article/download/2990/2973
- www.ijarcs.info/index.php/Ijarcs/article/download/3777/3258
- www.ijcscn.com/Documents/Volumes/vol1issue3/ijcscn2011010310.pdf
- Disha Patel, Hitarthi Hora, Prof. Ajaysinh Rathod,: Analysis of Security Threats On Data In Distributed Application, International Journal of AdvanceEngineering and Research Development, Special Issue SIEICON-2017 e-ISSN : 2348-4470, April -2017.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.